In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate...In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggre- gate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assump- tion.展开更多
基金This research was supported by the National Natural Science Foundation of China (Grant Nos. 61272425, 61170021, 61202475), Qingdao Science and Technology Development Project (12-1-4-2-(16)-jch, 13-1-4-151-jch), Huawei Technology Fund (YB2013120027), the Founda- tion of China Scholarship Council, Shandong Provincial Key Laboratory of Computer Network (SDKLCN-2013-03), the Open Research Fund from the State Key Laboratory of Information Security, the Open Project Foun- dation of Shandong Provincial Key Laboratory of Software Engineering (2013SE01), and China Postdoctoral Science Foundation (2014M551870).
文摘In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggre- gate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assump- tion.